| 9f1622b0 | 07-Mar-2019 |
Paul Beesley <paul.beesley@arm.com> |
doc: Move content out of readme and create new index page
Previously the readme.rst file served as the entrypoint for the documentation. With a Sphinx build the top-level document is set to be index
doc: Move content out of readme and create new index page
Previously the readme.rst file served as the entrypoint for the documentation. With a Sphinx build the top-level document is set to be index.rst as it contains the primary document index.
This patch moves some content from readme.rst into index.rst and splits the license information out into license.rst.
Change-Id: I5c50250b81136fe36aa9ceedaae302b44ec11e47 Signed-off-by: Paul Beesley <paul.beesley@arm.com>
show more ...
|
| 40d553cf | 11-Feb-2019 |
Paul Beesley <paul.beesley@arm.com> |
doc: Move documents into subdirectories
This change creates the following directories under docs/ in order to provide a grouping for the content:
- components - design - getting_started - perf - pr
doc: Move documents into subdirectories
This change creates the following directories under docs/ in order to provide a grouping for the content:
- components - design - getting_started - perf - process
In each of these directories an index.rst file is created and this serves as an index / landing page for each of the groups when the pages are compiled. Proper layout of the top-level table of contents relies on this directory/index structure.
Without this patch it is possible to build the documents correctly with Sphinx but the output looks messy because there is no overall hierarchy.
Change-Id: I3c9f4443ec98571a56a6edf775f2c8d74d7f429f Signed-off-by: Paul Beesley <paul.beesley@arm.com>
show more ...
|
| 653279b0 | 23-Jan-2019 |
Paul Beesley <paul.beesley@arm.com> |
doc: Add minimal Sphinx support
Add the essentials for supporting a Sphinx documentation build:
- A makefile under docs/ to invoke Sphinx with the desired output format - A Sphinx master configur
doc: Add minimal Sphinx support
Add the essentials for supporting a Sphinx documentation build:
- A makefile under docs/ to invoke Sphinx with the desired output format - A Sphinx master configuration file (conf.py) - A single, top-level index page (index.rst) - The TF.org logo that is integrated in the the sidebar of the rendered output
Change-Id: I85e67e939658638337ca7972936a354878083a25 Signed-off-by: Paul Beesley <paul.beesley@arm.com>
show more ...
|
| b189a206 | 21-May-2019 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "Fix docs references to header files" into integration |
| ce8dc187 | 13-May-2019 |
John Tsichritzis <john.tsichritzis@arm.com> |
Fix docs references to header files
Change-Id: I5c06e777d93ac653a853997c2b7c1c9d09b1e49c Signed-off-by: John Tsichritzis <john.tsichritzis@arm.com> |
| 532a67dd | 20-May-2019 |
John Tsichritzis <john.tsichritzis@arm.com> |
Update docs for FVP v11.6
Change-Id: I33c1bf49aa10867e1a2ca4c167112b99bf756dda Signed-off-by: John Tsichritzis <john.tsichritzis@arm.com> |
| 3fa9dec4 | 10-Apr-2019 |
kenny liang <kenny.liang@mediatek.com> |
Initialize platform for MediaTek mt8183
- Add basic platform setup - Add generic CPU helper functions - Add delay timer platform implementation - Use TI 16550 uart driver
Change-Id: I1c29569c68fe9f
Initialize platform for MediaTek mt8183
- Add basic platform setup - Add generic CPU helper functions - Add delay timer platform implementation - Use TI 16550 uart driver
Change-Id: I1c29569c68fe9fca5e10e88a22a29690bab7141f Signed-off-by: kenny liang <kenny.liang@mediatek.com>
show more ...
|
| ac864694 | 08-May-2019 |
Soby Mathew <soby.mathew@arm.com> |
Merge "Fix RST rendering and other typos" into integration |
| 6d0512f5 | 07-May-2019 |
John Tsichritzis <john.tsichritzis@arm.com> |
Fix RST rendering and other typos
1) One space was missing from the indentation and, hence, rendering error was generated in the user guide. 2) Partially reword Pointer Authentication related info.
Fix RST rendering and other typos
1) One space was missing from the indentation and, hence, rendering error was generated in the user guide. 2) Partially reword Pointer Authentication related info.
Change-Id: Id5e65d419ec51dd7764f24d1b96b6c9942d63ba4 Signed-off-by: John Tsichritzis <john.tsichritzis@arm.com>
show more ...
|
| 0cdbd023 | 07-May-2019 |
Soby Mathew <soby.mathew@arm.com> |
Merge changes from topic "sm/fix_a76_errata" into integration
* changes: Workaround for cortex-A76 errata 1286807 Cortex-A76: workarounds for errata 1257314, 1262606, 1262888, 1275112 |
| e6e1d0ac | 01-May-2019 |
Soby Mathew <soby.mathew@arm.com> |
Cortex-A76: workarounds for errata 1257314, 1262606, 1262888, 1275112
The workarounds for errata 1257314, 1262606, 1262888 and 1275112 are added to the Cortex-A76 cpu specific file. The workarounds
Cortex-A76: workarounds for errata 1257314, 1262606, 1262888, 1275112
The workarounds for errata 1257314, 1262606, 1262888 and 1275112 are added to the Cortex-A76 cpu specific file. The workarounds are disabled by default and have to be explicitly enabled by the platform integrator.
Change-Id: I70474927374cb67725f829d159ddde9ac4edc343 Signed-off-by: Soby Mathew <soby.mathew@arm.com>
show more ...
|
| 854ca7da | 03-May-2019 |
Soby Mathew <soby.mathew@arm.com> |
Merge "Add compile-time errors for HW_ASSISTED_COHERENCY flag" into integration |
| 076b5f02 | 19-Mar-2019 |
John Tsichritzis <john.tsichritzis@arm.com> |
Add compile-time errors for HW_ASSISTED_COHERENCY flag
This patch fixes this issue: https://github.com/ARM-software/tf-issues/issues/660
The introduced changes are the following:
1) Some cores imp
Add compile-time errors for HW_ASSISTED_COHERENCY flag
This patch fixes this issue: https://github.com/ARM-software/tf-issues/issues/660
The introduced changes are the following:
1) Some cores implement cache coherency maintenance operation on the hardware level. For those cores, such as - but not only - the DynamIQ cores, it is mandatory that TF-A is compiled with the HW_ASSISTED_COHERENCY flag. If not, the core behaviour at runtime is unpredictable. To prevent this, compile time checks have been added and compilation errors are generated, if needed.
2) To enable this change for FVP, a logical separation has been done for the core libraries. A system cannot contain cores of both groups, i.e. cores that manage coherency on hardware and cores that don't do it. As such, depending on the HW_ASSISTED_COHERENCY flag, FVP includes the libraries only of the relevant cores.
3) The neoverse_e1.S file has been added to the FVP sources.
Change-Id: I787d15819b2add4ec0d238249e04bf0497dc12f3 Signed-off-by: John Tsichritzis <john.tsichritzis@arm.com>
show more ...
|
| 9e4609f1 | 24-Apr-2019 |
Christoph Müllner <christophm30@gmail.com> |
build_macros: Add mechanism to prevent bin generation.
On certain platforms it does not make sense to generate TF-A binary images. For example a platform could make use of serveral memory areas, whi
build_macros: Add mechanism to prevent bin generation.
On certain platforms it does not make sense to generate TF-A binary images. For example a platform could make use of serveral memory areas, which are non-continuous and the resulting binary therefore would suffer from the padding-bytes. Typically these platforms use the ELF image.
This patch introduces a variable DISABLE_BIN_GENERATION, which can be set to '1' in the platform makefile to prevent the binary generation.
Signed-off-by: Christoph Müllner <christophm30@gmail.com> Change-Id: I62948e88bab685bb055fe6167d9660d14e604462
show more ...
|
| 29162843 | 30-Apr-2019 |
Soby Mathew <soby.mathew@arm.com> |
Merge changes from topic "lm/stack_protector" into integration
* changes: juno: Add security sources for tsp-juno Add support for default stack-protector flag |
| fd7b287c | 26-Mar-2019 |
Louis Mayencourt <louis.mayencourt@arm.com> |
Add support for default stack-protector flag
The current stack-protector support is for none, "strong" or "all". The default use of the flag enables the stack-protection to all functions that declar
Add support for default stack-protector flag
The current stack-protector support is for none, "strong" or "all". The default use of the flag enables the stack-protection to all functions that declare a character array of eight bytes or more in length on their stack. This option can be tuned with the --param=ssp-buffer-size=N option.
Change-Id: I11ad9568187d58de1b962b8ae04edd1dc8578fb0 Signed-off-by: Louis Mayencourt <louis.mayencourt@arm.com>
show more ...
|
| f15e7adb | 29-Apr-2019 |
Soby Mathew <soby.mathew@arm.com> |
Merge changes from topic "avenger96" into integration
* changes: fdts: Fix DTC warnings for STM32MP1 platform docs: plat: stm32mp1: Document the usage of DTB_FILE_NAME variable stm32mp1: Add A
Merge changes from topic "avenger96" into integration
* changes: fdts: Fix DTC warnings for STM32MP1 platform docs: plat: stm32mp1: Document the usage of DTB_FILE_NAME variable stm32mp1: Add Avenger96 board support
show more ...
|
| f657fa99 | 26-Apr-2019 |
Manivannan Sadhasivam <manivannan.sadhasivam@linaro.org> |
docs: plat: stm32mp1: Document the usage of DTB_FILE_NAME variable
Since STM32MP1 platform supports different boards, it is necessary to build for a particular board. With the current instructions,
docs: plat: stm32mp1: Document the usage of DTB_FILE_NAME variable
Since STM32MP1 platform supports different boards, it is necessary to build for a particular board. With the current instructions, the user has to modify the DTB_FILE_NAME variable in platform.mk for building for a particular board, but this can be avoided by passing the appropriate board DTB name via DTB_FILE_NAME make variable. Hence document the same in platform doc.
Signed-off-by: Manivannan Sadhasivam <manivannan.sadhasivam@linaro.org> Change-Id: I16797e7256c7eb699a7b8846356fe430d0fe0aa1
show more ...
|
| 8742f857 | 26-Apr-2019 |
Soby Mathew <soby.mathew@arm.com> |
Merge changes from topic "rk3288" into integration
* changes: rockchip: document platform rockchip: add support for rk3288 rockchip: add common aarch32 support rockchip: rk3328: drop double
Merge changes from topic "rk3288" into integration
* changes: rockchip: document platform rockchip: add support for rk3288 rockchip: add common aarch32 support rockchip: rk3328: drop double declaration of entry_point storage rockchip: Allow socs with undefined wfe check bits rockchip: move pmusram assembler code to a aarch64 subdir sp_min: allow inclusion of a platform-specific linker script sp_min: make sp_min_warm_entrypoint public drivers: ti: uart: add a aarch32 variant
show more ...
|
| 55617251 | 19-Apr-2019 |
Heiko Stuebner <heiko@sntech.de> |
rockchip: document platform
This adds a rockchip.rst to docs/plat documenting the general approach to using the Rockchip ATF platforms together with the supported bootloaders and also adds myself as
rockchip: document platform
This adds a rockchip.rst to docs/plat documenting the general approach to using the Rockchip ATF platforms together with the supported bootloaders and also adds myself as maintainer after making sure Tony Xie is ok with that.
Signed-off-by: Heiko Stuebner <heiko@sntech.de> Change-Id: Idce53d15eff4ac6de05bbb35d86e57ed50d0cbb9
show more ...
|
| c1491eba | 24-Apr-2019 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Doc: Update link to TBBR-CLIENT specification
Change-Id: Iafa79b6f7891d3eebec9908a8f7725131202beb3 Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com> |
| d87af648 | 23-Apr-2019 |
Antonio Niño Díaz <antonio.ninodiaz@arm.com> |
Merge "Cortex A9: Fix typo in errata 794073 workaround" into integration |
| 1989a19c | 19-Apr-2019 |
Yann Gautier <yann.gautier@st.com> |
stm32mp1: add OP-TEE support
Support booting OP-TEE as BL32 boot stage and secure runtime service.
OP-TEE executes in internal RAM and uses a secure DDR area to store the pager pagestore. Memory ma
stm32mp1: add OP-TEE support
Support booting OP-TEE as BL32 boot stage and secure runtime service.
OP-TEE executes in internal RAM and uses a secure DDR area to store the pager pagestore. Memory mapping and TZC are configured accordingly prior OP-TEE boot. OP-TEE image is expected in OP-TEE v2 format where a header file describes the effective boot images. This change post processes header file content to get OP-TEE load addresses and set OP-TEE boot arguments.
Change-Id: I02ef8b915e4be3e95b27029357d799d70e01cd44 Signed-off-by: Yann Gautier <yann.gautier@st.com> Signed-off-by: Etienne Carriere <etienne.carriere@st.com>
show more ...
|
| b4e9ab9c | 18-Apr-2019 |
Louis Mayencourt <louis.mayencourt@arm.com> |
Cortex A9: Fix typo in errata 794073 workaround
Change-Id: I22568caf83b9846cd7b59241fcec34a395825399 Signed-off-by: Louis Mayencourt <louis.mayencourt@arm.com> |
| 0e985d70 | 09-Apr-2019 |
Louis Mayencourt <louis.mayencourt@arm.com> |
DSU: Implement workaround for errata 798953
Under certain near idle conditions, DSU may miss response transfers on the ACE master or Peripheral port, leading to deadlock. This workaround disables hi
DSU: Implement workaround for errata 798953
Under certain near idle conditions, DSU may miss response transfers on the ACE master or Peripheral port, leading to deadlock. This workaround disables high-level clock gating of the DSU to prevent this.
Change-Id: I820911d61570bacb38dd325b3519bc8d12caa14b Signed-off-by: Louis Mayencourt <louis.mayencourt@arm.com>
show more ...
|