aboutsummaryrefslogtreecommitdiff
path: root/docs/user-guide.md
diff options
context:
space:
mode:
authorHarry Liebel <Harry.Liebel@arm.com>2014-04-01 19:28:07 +0100
committerHarry Liebel <Harry.Liebel@arm.com>2014-04-24 19:34:01 +0100
commitce19cf1bb56cfa72155b0c7f5d6c07bbf6efc11f (patch)
tree850417aea3a8bd5bba14bcce4cb2097ad3c1b725 /docs/user-guide.md
parentf2199d95d931826be7f87af0935ac536812d0488 (diff)
downloadarm-trusted-firmware-ce19cf1bb56cfa72155b0c7f5d6c07bbf6efc11f.tar.gz
FVP secure memory support documentation
Fixes ARM-software/tf-issues#64 Change-Id: I4e56c25f9dc7f486fbf6fa2f7d8253874119b989
Diffstat (limited to 'docs/user-guide.md')
-rw-r--r--docs/user-guide.md16
1 files changed, 14 insertions, 2 deletions
diff --git a/docs/user-guide.md b/docs/user-guide.md
index 39d09c1..1bb0fe9 100644
--- a/docs/user-guide.md
+++ b/docs/user-guide.md
@@ -532,9 +532,15 @@ NOTE: The `-C bp.flashloader0.fname` parameter is used to load a Firmware Image
Package at the start of NOR FLASH0 (see the "Building the Trusted Firmware"
section above).
+NOTE: Setting the `-C bp.secure_memory` parameter to `1` is only supported on
+FVP versions 5.4 and newer. Setting this parameter to `0` is also supported.
+The `-C bp.tzc_400.diagnostics=1` parameter is optional. It instructs the FVP to
+provide some helpful information if a secure memory violation occurs.
+
<path-to>/FVP_Base_AEMv8A-AEMv8A \
-C pctl.startup=0.0.0.0 \
- -C bp.secure_memory=0 \
+ -C bp.secure_memory=1 \
+ -C bp.tzc_400.diagnostics=1 \
-C cluster0.NUM_CORES=4 \
-C cluster1.NUM_CORES=4 \
-C cache_state_modelled=1 \
@@ -560,9 +566,15 @@ NOTE: The `-C bp.flashloader0.fname` parameter is used to load a Firmware Image
Package at the start of NOR FLASH0 (see the "Building the Trusted Firmware"
section above).
+NOTE: Setting the `-C bp.secure_memory` parameter to `1` is only supported on
+FVP versions 5.4 and newer. Setting this parameter to `0` is also supported.
+The `-C bp.tzc_400.diagnostics=1` parameter is optional. It instructs the FVP to
+provide some helpful information if a secure memory violation occurs.
+
<path-to>/FVP_Base_Cortex-A57x4-A53x4 \
-C pctl.startup=0.0.0.0 \
- -C bp.secure_memory=0 \
+ -C bp.secure_memory=1 \
+ -C bp.tzc_400.diagnostics=1 \
-C cache_state_modelled=1 \
-C bp.pl011_uart0.untimed_fifos=1 \
-C bp.secureflashloader.fname="<path-to>/<bl1-binary>" \