Pdf Manual Located Under the “Documentation” Directory

Total Page:16

File Type:pdf, Size:1020Kb

Pdf Manual Located Under the “Documentation” Directory Trusted Firmware-A unknown Sep 24, 2021 CONTENTS 1 About 1 2 Getting Started 25 3 Processes & Policies 107 4 Components 135 5 System Design 239 6 Platform Ports 337 7 Performance & Testing 445 8 Security Advisories 453 9 Design Documents 465 10 Threat Model 469 11 Change Log & Release Notes 495 12 Glossary 571 13 License 575 14 Getting Started 577 Index 579 i ii CHAPTER ONE ABOUT 1.1 Feature Overview This page provides an overview of the current TF-A feature set. For a full description of these features and their implementation details, please see the documents that are part of the Components and System Design chapters. The Change Log & Release Notes provides details of changes made since the last release. 1.1.1 Current features • Initialization of the secure world, for example exception vectors, control registers and interrupts for the platform. • Library support for CPU specific reset and power down sequences. This includes support for errata workarounds and the latest Arm DynamIQ CPUs. • Drivers to enable standard initialization of Arm System IP, for example Generic Interrupt Controller (GIC), Cache Coherent Interconnect (CCI), Cache Coherent Network (CCN), Network Interconnect (NIC) and Trust- Zone Controller (TZC). • A generic SCMI driver to interface with conforming power controllers, for example the Arm System Control Processor (SCP). • SMC (Secure Monitor Call) handling, conforming to the SMC Calling Convention using an EL3 runtime services framework. • PSCI library support for CPU, cluster and system power management use-cases. This library is pre-integrated with the AArch64 EL3 Runtime Software, and is also suitable for integration with other AArch32 EL3 Runtime Software, for example an AArch32 Secure OS. • A minimal AArch32 Secure Payload (SP_MIN) to demonstrate PSCI library integration with AArch32 EL3 Runtime Software. • Secure Monitor library code such as world switching, EL1 context management and interrupt routing. When a Secure-EL1 Payload (SP) is present, for example a Secure OS, the AArch64 EL3 Runtime Software must be integrated with a Secure Payload Dispatcher (SPD) component to customize the interaction with the SP. • A Test SP and SPD to demonstrate AArch64 Secure Monitor functionality and SP interaction with PSCI. • SPDs for the OP-TEE Secure OS, NVIDIA Trusted Little Kernel and Trusty Secure OS. • A Trusted Board Boot implementation, conforming to all mandatory TBBR requirements. This includes im- age authentication, Firmware Update (or recovery mode), and packaging of the various firmware images into a Firmware Image Package (FIP). • Pre-integration of TBB with the Arm CryptoCell product, to take advantage of its hardware Root of Trust and crypto acceleration services. 1 Trusted Firmware-A • Reliability, Availability, and Serviceability (RAS) functionality, including – A Secure Partition Manager (SPM) to manage Secure Partitions in Secure-EL0, which can be used to implement simple management and security services. – An SDEI dispatcher to route interrupt-based SDEI events. – An Exception Handling Framework (EHF) that allows dispatching of EL3 interrupts to their registered handlers, to facilitate firmware-first error handling. • A dynamic configuration framework that enables each of the firmware images to be configured atruntimeif required by the platform. It also enables loading of a hardware configuration (for example, a kernel device tree) as part of the FIP, to be passed through the firmware stages. This feature is now incorporated inside the firmware configuration framework (fconf), which is still flagged as experimental. • Support for alternative boot flows, for example to support platforms where the EL3 Runtime Software isloaded using other firmware or a separate secure system processor, or where a non-TF-A ROM expects BL2 tobeloaded at EL3. • Support for the GCC, LLVM and Arm Compiler 6 toolchains. • Support for combining several libraries into a “romlib” image that may be shared across images to reduce memory footprint. The romlib image is stored in ROM but is accessed through a jump-table that may be stored in read- write memory, allowing for the library code to be patched. • Support for the Secure Partition Manager Dispatcher (SPMD) component as a new standard service. • Support for ARMv8.3 pointer authentication in the normal and secure worlds. The use of pointer authentication in the normal world is enabled whenever architectural support is available, without the need for additional build flags. Use of pointer authentication in the secure world remains an experimental configuration at this timeand requires the BRANCH_PROTECTION option to be set to non-zero. • Position-Independent Executable (PIE) support. Currently for BL2, BL31, and TSP, with further support to be added in a future release. 1.1.2 Still to come • Support for additional platforms. • Refinements to Position Independent Executable (PIE) support. • Continued support for the FF-A v1.0 (formally known as SPCI) specification, to enable the use of secure partition management in the secure world. • Documentation enhancements. • Ongoing support for new architectural features, CPUs and System IP. • Ongoing support for new Arm system architecture specifications. • Ongoing security hardening, optimization and quality improvements. Copyright (c) 2019-2021, Arm Limited. All rights reserved. 2 Chapter 1. About Trusted Firmware-A 1.2 Release Processes 1.2.1 Project Release Cadence The project currently aims to do a release once every 6 months which will be tagged on the master branch. There will be a code freeze (stop merging non-essential changes) up to 4 weeks prior to the target release date. The release candidates will start appearing after this and only bug fixes or updates required for the release will be merged. The maintainers are free to use their judgement on what changes are essential for the release. A release branch may be created after code freeze if there are significant changes that need merging onto the integration branch during the merge window. The release testing will be performed on release candidates and depending on issues found, additional release candidates may be created to fix the issues. |<----------6 months---------->| |<---4 weeks--->||<---4 weeks--->| +-----------------------------------------------------------> time |||| code freeze ver w.x code freeze ver y.z Upcoming Releases These are the estimated dates for the upcoming release. These may change depending on project requirement and partner feedback. Release Version Target Date Expected Code Freeze v2.0 1st week of Oct ‘18 1st week of Sep ‘18 v2.1 5th week of Mar ‘19 1st week of Mar ‘19 v2.2 4th week of Oct ‘19 1st week of Oct ‘19 v2.3 4th week of Apr ‘20 1st week of Apr ‘20 v2.4 2nd week of Nov ‘20 4th week of Oct ‘20 v2.5 3rd week of May ‘21 5th week of Apr ‘21 v2.6 4th week of Oct ‘21 1st week of Oct ‘21 1.2.2 Removal of Deprecated Interfaces As mentioned in the Platform Compatibility Policy, this is a live document cataloging all the deprecated interfaces in TF-A project and the Release version after which it will be removed. Interface Deprecation Date Removed after Release Comments Copyright (c) 2018-2021, Arm Limited and Contributors. All rights reserved. 1.2. Release Processes 3 Trusted Firmware-A 1.3 Project Maintenance Trusted Firmware-A (TF-A) is an open governance community project. All contributions are ultimately merged by the maintainers listed below. Technical ownership of most parts of the codebase falls on the code owners listed below. An acknowledgement from these code owners is required before the maintainers merge a contribution. More details may be found in the Project Maintenance Process document. 1.3.1 Maintainers Mail Dan Handley <[email protected]> GitHub ID danh-arm Mail Soby Mathew <[email protected]> GitHub ID soby-mathew Mail Sandrine Bailleux <[email protected]> GitHub ID sandrine-bailleux-arm Mail Alexei Fedorov <[email protected]> GitHub ID AlexeiFedorov Mail Manish Pandey <[email protected]> GitHub ID manish-pandey-arm Mail Mark Dykes <[email protected]> GitHub ID mardyk01 Mail Olivier Deprez <[email protected]> GitHub ID odeprez Mail Bipin Ravi <[email protected]> GitHub ID bipinravi-arm Mail Joanna Farley <[email protected]> GitHub ID joannafarley-arm Mail Julius Werner <[email protected]> GitHub ID jwerner-chromium Mail Varun Wadekar <[email protected]> GitHub ID vwadekar Mail Andre Przywara <[email protected]> GitHub ID Andre-ARM Mail Lauren Wehrmeister <[email protected]> GitHub ID laurenw-arm Mail Madhukar Pappireddy <[email protected]> GitHub ID madhukar-Arm Mail Raghu Krishnamurthy <[email protected]> 4 Chapter 1. About Trusted Firmware-A GitHub ID raghuncstate 1.3.2 Code owners Common Code Armv7-A architecture port Mail Etienne Carriere <[email protected]> GitHub ID etienne-lms Build Definitions for CMake Build System Mail Javier Almansa Sobrino <[email protected]> GitHub ID javieralso-arm Mail Chris Kay <[email protected]> GitHub ID CJKay Files / Software Delegated Exception Interface (SDEI) Mail Mark Dykes <[email protected]> GitHub ID mardyk01 Mail John Powell <[email protected]> GitHub ID john-powell-arm Files services/std_svc/sdei/ Trusted Boot Mail Sandrine Bailleux <[email protected]> GitHub ID sandrine-bailleux-arm Mail Manish Pandey <[email protected]> GitHub ID manish-pandey-arm Mail Manish Badarkhe <[email protected]> GitHub ID ManishVB-Arm Files drivers/auth/ 1.3. Project Maintenance
Recommended publications
  • Bootstomp: on the Security of Bootloaders in Mobile Devices
    BootStomp: On the Security of Bootloaders in Mobile Devices Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna, UC Santa Barbara https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/redini This paper is included in the Proceedings of the 26th USENIX Security Symposium August 16–18, 2017 • Vancouver, BC, Canada ISBN 978-1-931971-40-9 Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX BootStomp: On the Security of Bootloaders in Mobile Devices Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna fnredini, machiry, dipanjan, yanick, antoniob, edg, yans, chris, [email protected] University of California, Santa Barbara Abstract by proposing simple mitigation steps that can be im- plemented by manufacturers to safeguard the bootloader Modern mobile bootloaders play an important role in and OS from all of the discovered attacks, using already- both the function and the security of the device. They deployed hardware features. help ensure the Chain of Trust (CoT), where each stage of the boot process verifies the integrity and origin of 1 Introduction the following stage before executing it. This process, in theory, should be immune even to attackers gaining With the critical importance of the integrity of today’s full control over the operating system, and should pre- mobile and embedded devices, vendors have imple- vent persistent compromise of a device’s CoT. However, mented a string of inter-dependent mechanisms aimed at not only do these bootloaders necessarily need to take removing the possibility of persistent compromise from untrusted input from an attacker in control of the OS in the device.
    [Show full text]
  • FAN53525 3.0A, 2.4Mhz, Digitally Programmable Tinybuck® Regulator
    FAN53525 — 3.0 A, 2.4 MHz, June 2014 FAN53525 3.0A, 2.4MHz, Digitally Programmable TinyBuck® Regulator Digitally Programmable TinyBuck Digitally Features Description . Fixed-Frequency Operation: 2.4 MHz The FAN53525 is a step-down switching voltage regulator that delivers a digitally programmable output from an input . Best-in-Class Load Transient voltage supply of 2.5 V to 5.5 V. The output voltage is 2 . Continuous Output Current Capability: 3.0 A programmed through an I C interface capable of operating up to 3.4 MHz. 2.5 V to 5.5 V Input Voltage Range Using a proprietary architecture with synchronous . Digitally Programmable Output Voltage: rectification, the FAN53525 is capable of delivering 3.0 A - 0.600 V to 1.39375 V in 6.25 mV Steps continuous at over 80% efficiency, maintaining that efficiency at load currents as low as 10 mA. The regulator operates at Programmable Slew Rate for Voltage Transitions . a nominal fixed frequency of 2.4 MHz, which reduces the . I2C-Compatible Interface Up to 3.4 Mbps value of the external components to 330 nH for the output inductor and as low as 20 µF for the output capacitor. PFM Mode for High Efficiency in Light Load . Additional output capacitance can be added to improve . Quiescent Current in PFM Mode: 50 µA (Typical) regulation during load transients without affecting stability, allowing inductance up to 1.2 µH to be used. Input Under-Voltage Lockout (UVLO) ® At moderate and light loads, Pulse Frequency Modulation Regulator Thermal Shutdown and Overload Protection . (PFM) is used to operate in Power-Save Mode with a typical .
    [Show full text]
  • GPU Developments 2018
    GPU Developments 2018 2018 GPU Developments 2018 © Copyright Jon Peddie Research 2019. All rights reserved. Reproduction in whole or in part is prohibited without written permission from Jon Peddie Research. This report is the property of Jon Peddie Research (JPR) and made available to a restricted number of clients only upon these terms and conditions. Agreement not to copy or disclose. This report and all future reports or other materials provided by JPR pursuant to this subscription (collectively, “Reports”) are protected by: (i) federal copyright, pursuant to the Copyright Act of 1976; and (ii) the nondisclosure provisions set forth immediately following. License, exclusive use, and agreement not to disclose. Reports are the trade secret property exclusively of JPR and are made available to a restricted number of clients, for their exclusive use and only upon the following terms and conditions. JPR grants site-wide license to read and utilize the information in the Reports, exclusively to the initial subscriber to the Reports, its subsidiaries, divisions, and employees (collectively, “Subscriber”). The Reports shall, at all times, be treated by Subscriber as proprietary and confidential documents, for internal use only. Subscriber agrees that it will not reproduce for or share any of the material in the Reports (“Material”) with any entity or individual other than Subscriber (“Shared Third Party”) (collectively, “Share” or “Sharing”), without the advance written permission of JPR. Subscriber shall be liable for any breach of this agreement and shall be subject to cancellation of its subscription to Reports. Without limiting this liability, Subscriber shall be liable for any damages suffered by JPR as a result of any Sharing of any Material, without advance written permission of JPR.
    [Show full text]
  • Streaming Integrated Amplifier User’S Manual U S E’ S M an U a L
    OmniaOmnia A300 Streaming Integrated Amplifier User’s Manual U S E’ S M AN U A L Table of Contents FCC NOTICE - DECLARATION OF CONFORMITY INFORMATION .................................................................... 2 EU DECLARATION OF CONFORMITY ........................................................................................................... 3 SAFETY INSTRUCTIONS ............................................................................................................................. 4 WHAT’S IN THE BOX .................................................................................................................................. 7 QUICK SETUP GUIDE .............................................................................................................................. 8 WIRELESS AUTO SETUP ............................................................................................................................. 9 CONTROLLING MULTIPLE A300 AND RE-STREAMING ........................................................................ 14 WIRELESS MANUAL SETUP ................................................................................................................. 16 INTRODUCTION ................................................................................................................................... 17 TECHNICAL HIGHLIGHTS ......................................................................................................................... 17 LISTENING OPTIMIZATION .....................................................................................................................
    [Show full text]
  • Embedded Computer Solutions for Advanced Automation Control «
    » Embedded Computer Solutions for Advanced Automation Control « » Innovative Scalable Hardware » Qualifi ed for Industrial Software » Open Industrial Communication The pulse of innovation » We enable Automation! « Open Industrial Automation Platforms Kontron, one of the leaders of embedded computing technol- ogy has established dedicated global business units to provide application-ready OEM platforms for specifi c markets, includ- ing Industrial Automation. With our global corporate headquarters located in Germany, Visualization & Control Data Storage Internet-of-Things and regional headquarters in the United States and Asia-Pa- PanelPC Industrial Server cifi c, Kontron has established a strong presence worldwide. More than 1000 highly qualifi ed engineers in R&D, technical Industrie 4.0 support, and project management work with our experienced sales teams and sales partners to devise a solution that meets M2M SYMKLOUD your individual application’s demands. When it comes to embedded computing, you can focus on your core capabilities and rely on Kontron as your global OEM part- ner for a successful long-term business relationship. In addition to COTS standards based products, Kontron also of- fers semi- and full-custom ODM services for a full product port- folio that ranges from Computer-on-Modules and SBCs, up to embedded integrated systems and application ready platforms. Open for new technologies Kontron provides an exceptional range of hardware for any kind of control solution. Open for individual application Kontron systems are available either as readily integrated control solutions, or as open platforms for customers who build their own control applications with their own look and feel. Open for real-time Kontron’s Industrial Automation platforms are open for Real- Industrial Ethernet Time operating systems like VxWorks and Linux with real time extension.
    [Show full text]
  • – Amlogic S905X2 Chipset – Armv8-A Architecture – ARM G31
    NV-720 series IPTV Set-Top Boxes Data Sheet Integrated Networking Solutions – Amlogic S905X2 chipset – ARMv8-A architecture – ARM G31 MP2 graphic accelerator – 2D/3D accelerators, support for OpenGL 3.2 – OS Android 9 – App store – Support for widely used Middleware – Android API, SDK – H.265 – 4Kp60 decoding – Wi-Fi 802.11a/b/g/n/ac – HDMI 2.1 NV-720 IPTV set-top boxes on Android ensure a new Peer-to-Peer TV level of service provision. NV-720 series set-top boxes support real-time NV-720 is an excellent way to promote digital television playback of media files via DC++ protocol without a services and to attract new customers. PC or files preloading to a local disk. There is an opportunity of downloaded files queue creation, Android platform background downloading and organization of an NV-711 Android allows the creation of a single universal illustrated page (catalogue) for media content. platform for access to services including AndroidTV interface. Basic services – HD/UHD IPTV Customized app store creation – OTT The open platform and development tools (SDK, API) – VoD make it possible to create new operator services. – Media Player (files playback from external storage media and a local network) Hardware – Electronic program guide (EPG) Quad-core Amlogic media processor supports a wide – Support for cloud services range of audio and video formats. – Online sources: YouTube, Internet radio, etc. – Provider’s app store Up-to-date Wi-Fi technologies – Support for HLS NV-720-WB set-top boxes support up-to-date Wi-Fi – Peer-to-Peer TV (streaming via DC++) standards: 802.11a/b/g/n/ас.
    [Show full text]
  • Low-Power Ultra-Small Edge AI Accelerators for Image Recog- Nition with Convolution Neural Networks: Analysis and Future Directions
    Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 16 July 2021 doi:10.20944/preprints202107.0375.v1 Review Low-power Ultra-small Edge AI Accelerators for Image Recog- nition with Convolution Neural Networks: Analysis and Future Directions Weison Lin 1, *, Adewale Adetomi 1 and Tughrul Arslan 1 1 Institute for Integrated Micro and Nano Systems, University of Edinburgh, Edinburgh EH9 3FF, UK; [email protected]; [email protected] * Correspondence: [email protected] Abstract: Edge AI accelerators have been emerging as a solution for near customers’ applications in areas such as unmanned aerial vehicles (UAVs), image recognition sensors, wearable devices, ro- botics, and remote sensing satellites. These applications not only require meeting performance tar- gets but also meeting strict reliability and resilience constraints due to operations in harsh and hos- tile environments. Numerous research articles have been proposed, but not all of these include full specifications. Most of these tend to compare their architecture with other existing CPUs, GPUs, or other reference research. This implies that the performance results of the articles are not compre- hensive. Thus, this work lists the three key features in the specifications such as computation ability, power consumption, and the area size of prior art edge AI accelerators and the CGRA accelerators during the past few years to define and evaluate the low power ultra-small edge AI accelerators. We introduce the actual evaluation results showing the trend in edge AI accelerator design about key performance metrics to guide designers on the actual performance of existing edge AI acceler- ators’ capability and provide future design directions and trends for other applications with chal- lenging constraints.
    [Show full text]
  • Tegra Linux Driver Package
    TEGRA LINUX DRIVER PACKAGE RN_05071-R32 | March 18, 2019 Subject to Change 32.1 Release Notes RN_05071-R32 Table of Contents 1.0 About this Release ................................................................................... 3 1.1 Login Credentials ............................................................................................... 4 2.0 Known Issues .......................................................................................... 5 2.1 General System Usability ...................................................................................... 5 2.2 Boot .............................................................................................................. 6 2.3 Camera ........................................................................................................... 6 2.4 CUDA Samples .................................................................................................. 7 2.5 Multimedia ....................................................................................................... 7 3.0 Top Fixed Issues ...................................................................................... 9 3.1 General System Usability ...................................................................................... 9 3.2 Camera ........................................................................................................... 9 4.0 Documentation Corrections ..................................................................... 10 4.1 Adaptation and Bring-Up Guide ............................................................................
    [Show full text]
  • Amlogic Application Notes
    Amlogic Openlinux Release Notes Amlogic Buildroot Openlinux Release Note AMLOGIC, Inc. 2518 Mission College Blvd Santa Clara, CA 95054 U.S.A. www.amlogic.com AMLOGIC reserves the right to change any information described herein at any time without notice. AMLOGIC assumes no responsibility or liability from use of such information. Amlogic Confidential 1 Amlogic Openlinux Release Notes Content 1. Basic Information .............................................................................................................................................................. 3 1.1. INTRODUCTION ............................................................................................................................................................ 3 1.1.1. Kernel Version .................................................................................................................................................... 3 1.1.2. List of Supported Drivers .................................................................................................................................... 3 1.2. CHIP INFORMATION ..................................................................................................................................................... 3 1.3. HOW TO GET CODE ...................................................................................................................................................... 4 1.4. REFERENCE PLATFORM ...............................................................................................................................................
    [Show full text]
  • 042Cf377-Ed0c-4715-9260-770F680082fc.Pdf
    WiFi Tablets 70 Neon + The ARCHOS 70 Neon Plus is one of the most affordable tablets on the market. It includes a powerful quad-core processor running the latest Android operating system: Android™ 5.1 Lollipop®. The 7-inch IPS display provides incredible colors and wide viewing angles, perfect for enjoying your content on-the-go. The ARCHOS 70 Neon Plus is designed to offer a unique multimedia experience. AndroidTM 5.1, Lollipop® Android™ 5.1, “Lollipop” 7” IPS Capacitive Screen 1024x 600 pixels Rockchip 3126 Quad-Core CPU @ 1.3 GHz 1 GB RAM 8 GB flash memory (+ microSD slot) GB Micro SD Wifi WiFi, dual cameras, micro USB host, G-sensor, speaker... 8 4 5 90b Neon Featuring a powerful 1.2 GHz Quad-core processor and Dual-core graphics processor, the ARCHOS 90b Neon has a super smooth interface. At an affordable price, the ARCHOS 90b Neon delivers an amazing experience to meet all your needs: emails, movies, photos, web browsing… Android™ 4.4, “Kitkat” 9” Capacitive Screen 1024 x 600 pixels All Winner A33 Quad-Core CPU @ 1.2 GHz 512 MB RAM 8 GB flash memory (+ microSD slot) GB Wifi WiFi, dual cameras, micro USB host, G-sensor, 8 speaker... 6 7 101d Neon A mix between large screen and productivity, the ARCHOS 101d Neon includes a large 10.1” screen and ARCHOS media applications, perfect for your multimedia, wherever you are. Featuring a powerful Quad-core processor and Quad-core graphics processor, the ARCHOS 101d Neon offers a super smooth interface for an affordable price and delivers an amazing experience to meet all your needs.
    [Show full text]
  • Global Network Investment Competition Fudan University Supreme Pole ‐ Allwinner Technology
    Global Network Investment Competition Fudan University Supreme Pole ‐ Allwinner Technology Date: 31.10.2017 Fan Jiang Jianbin Gu Qianrong Lu Shijie Dong Zheng Xu Chunhua Xu Allwinner Technology ‐‐ Sail Again We initiate coverage on Allwinner Technology with a strong BUY rating, target price is derived by DCF at CNY ¥ 35.91 , indicating Price CNY ¥ 27.60 30.1% upside potential. Price Target CNY ¥ 35.91 Upside Potential 30.1% Target Period 1 Year We recommend based on: 52 week Low CNY ¥ 23.4 Broad prospects of the AI. 52 week High CNY ¥ 54.02 Supporting of the industry policy. Average Volume CNY ¥ 190.28 M Allwinner has finished its transition. Market Cap CNY ¥ 96.08 B The rise of the various new P/E 64 products will put the margins back Price Performance in the black. 60 The current valuation, 64.x P/E, is 50 lower than its competitor such as 40 Ingenic which is trading at more 30 than 100 and Nationz which is 20 trading at 76.x P/E. 10 0 Overview for Allwinner Allwinner Technology, founded in 2007, is a leading fabless design company dedicated to smart application processor SoCs and smart analog ICs. Its product line includes multi‐core application processors for smart devices and smart power management ICs used worldwide. These two categories of products are applied to various types of intelligent terminals into 3 major business lines: Consumer Electronics: Robot, Smart Hardware Open Platform, Tablets, Video Theater Device, E‐Reader, Video Story Machine, Action Camera, VR Home Entertainment: OTT Box, Karaoke Machine, IPC monitoring Connected Automotive Applications: Dash Cams, Smart Rear‐view Mirror, In Car Entertainment THE PROSPECT OF AI AI(Artificial Intelligence) has a wider range of global concern and is entering its third golden period of development.
    [Show full text]
  • Elinux Status
    Status of Embedded Linux Status of Embedded Linux April 2015 Tim Bird Architecture Group Chair 1 LF CE Workgroup 1 10/23/2014 PA1 Confidential Outline Kernel Versions Technology Areas CE Workgroup Projects Other Stuff Resources 2 2 10/23/2014 PA1 Confidential Outline Kernel Versions Technology Areas CE Workgroup Projects Other Stuff Resources 3 3 10/23/2014 PA1 Confidential Kernel Versions • Linux v3.14 – 30 Mar 2014 – 70 days • Linux v3.15 – 8 Jun 2014 – 70 days • Linux v3.16 – 3 Aug 2014 – 57 days • Linux v3.17 – 5 Oct 2014 – 63 days • Linux v3.18 – 7 Dec 2014 – 63 days • Linux v3.19 – 8 Feb 2015 – 63 day • Linux v4.0-rc7 – (60 days so far) • Linus said probably this weekend or next 4 4 10/23/2014 PA1 Confidential Linux v3.14 • Last long-term stable (LTS) kernel • LTS is at 3.14.37 (as of March 2015) • Will be supported until August of 2016 • Current LTSI is based on 3.14.28 5 10/23/2014 PA1 Confidential Linux v3.16 • Power-aware scheduling • decode_stacktrace.sh • Converts offsets in a stack trace to filenames and line numbers • F2FS large volume support 6 10/23/2014 PA1 Confidential Linux v3.17 • Lots of ARM hardware support • Newly enabled ARM hardware • Rockchip RK3288 SoC • Allwinner A23 SoC • Allwinner A31 Hummingbird • Tegra30 Apalis board support • Gumstix Pepper AM335x • AM437x TI evaluation board • Other ARM boards with existing support also saw improvements with Linux 3.17 • Rework of "config-bisect" mode in ktest 7 10/23/2014 PA1 Confidential Linux v3.18 • OverlayFS introduced • Size reduction patch: • madvise and fadvise
    [Show full text]