diff options
author | Dan Handley <dan.handley@arm.com> | 2018-03-01 18:44:00 +0000 |
---|---|---|
committer | David Cunado <david.cunado@arm.com> | 2018-03-15 17:00:34 +0000 |
commit | 4def07d5352893a33af18b04795f875fabff14de (patch) | |
tree | 4e0cf6a8d7cb0fb9f78b6d757f682ddd876cf665 /docs/cpu-specific-build-macros.rst | |
parent | c3e34a9e018532a5ff669c67028cb8d1dea7c7d2 (diff) | |
download | platform_external_arm-trusted-firmware-4def07d5352893a33af18b04795f875fabff14de.tar.gz platform_external_arm-trusted-firmware-4def07d5352893a33af18b04795f875fabff14de.tar.bz2 platform_external_arm-trusted-firmware-4def07d5352893a33af18b04795f875fabff14de.zip |
Update Arm TF references to TF-A
Update Arm Trusted Firmware references in the upstream documents to
Trusted Firmware-A (TF-A). This is for consistency with and
disambiguation from Trusted Firmware-M (TF-M).
Also update other Arm trademarks, e.g. ARM->Arm, ARMv8->Armv8-A.
Change-Id: I8bb0e18af29c6744eeea2dc6c08f2c10b20ede22
Signed-off-by: Dan Handley <dan.handley@arm.com>
Signed-off-by: David Cunado <david.cunado@arm.com>
Diffstat (limited to 'docs/cpu-specific-build-macros.rst')
-rw-r--r-- | docs/cpu-specific-build-macros.rst | 19 |
1 files changed, 9 insertions, 10 deletions
diff --git a/docs/cpu-specific-build-macros.rst b/docs/cpu-specific-build-macros.rst index 014817d39..9e11cdff6 100644 --- a/docs/cpu-specific-build-macros.rst +++ b/docs/cpu-specific-build-macros.rst @@ -1,4 +1,4 @@ -ARM CPU Specific Build Macros +Arm CPU Specific Build Macros ============================= @@ -14,8 +14,8 @@ for a specific CPU on a platform. Security Vulnerability Workarounds ---------------------------------- -ARM Trusted Firmware exports a series of build flags which control which -security vulnerability workarounds should be applied at runtime. +TF-A exports a series of build flags which control which security +vulnerability workarounds should be applied at runtime. - ``WORKAROUND_CVE_2017_5715``: Enables the security workaround for `CVE-2017-5715`_. Defaults to 1. @@ -23,10 +23,9 @@ security vulnerability workarounds should be applied at runtime. CPU Errata Workarounds ---------------------- -ARM Trusted Firmware exports a series of build flags which control the -errata workarounds that are applied to each CPU by the reset handler. The -errata details can be found in the CPU specific errata documents published -by ARM: +TF-A exports a series of build flags which control the errata workarounds that +are applied to each CPU by the reset handler. The errata details can be found +in the CPU specific errata documents published by Arm: - `Cortex-A53 MPCore Software Developers Errata Notice`_ - `Cortex-A57 MPCore Software Developers Errata Notice`_ @@ -135,8 +134,8 @@ architecture that can be enabled by the platform as desired. - ``A53_DISABLE_NON_TEMPORAL_HINT``: This flag disables the cache non-temporal hint. The LDNP/STNP instructions as implemented on Cortex-A53 do not behave in a way most programmers expect, and will most probably result in a - significant speed degradation to any code that employs them. The ARMv8-A - architecture (see ARM DDI 0487A.h, section D3.4.3) allows cores to ignore + significant speed degradation to any code that employs them. The Armv8-A + architecture (see Arm DDI 0487A.h, section D3.4.3) allows cores to ignore the non-temporal hint and treat LDNP/STNP as LDP/STP instead. Enabling this flag enforces this behaviour. This needs to be enabled only for revisions <= r0p3 of the CPU and is enabled by default. @@ -149,7 +148,7 @@ architecture that can be enabled by the platform as desired. -------------- -*Copyright (c) 2014-2016, ARM Limited and Contributors. All rights reserved.* +*Copyright (c) 2014-2018, Arm Limited and Contributors. All rights reserved.* .. _CVE-2017-5715: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5715 .. _Cortex-A53 MPCore Software Developers Errata Notice: http://infocenter.arm.com/help/topic/com.arm.doc.epm048406/Cortex_A53_MPCore_Software_Developers_Errata_Notice.pdf |