diff --git a/.github/workflows/build.yml b/.github/workflows/build.yml index adc9ada0a..12253b629 100644 --- a/.github/workflows/build.yml +++ b/.github/workflows/build.yml @@ -19,6 +19,8 @@ jobs: container: image: ghcr.io/texasinstruments/processor-sdk-doc:latest options: --entrypoint /bin/bash + permissions: + contents: read outputs: build-matrix: "${{ steps.matrix.outputs.matrix }}" steps: @@ -36,6 +38,8 @@ jobs: container: image: ghcr.io/texasinstruments/processor-sdk-doc:latest options: --entrypoint /bin/bash + permissions: + contents: read needs: collect strategy: matrix: diff --git a/.github/workflows/check_toc_txt.yml b/.github/workflows/check_toc_txt.yml index 82eec08bf..c04ddc666 100644 --- a/.github/workflows/check_toc_txt.yml +++ b/.github/workflows/check_toc_txt.yml @@ -19,6 +19,8 @@ jobs: container: image: ghcr.io/texasinstruments/processor-sdk-doc:latest options: --entrypoint /bin/bash + permissions: + contents: read steps: - name: Checkout repository diff --git a/.github/workflows/comment.yml b/.github/workflows/comment.yml index ac04fe4f7..5efe98f8f 100644 --- a/.github/workflows/comment.yml +++ b/.github/workflows/comment.yml @@ -15,6 +15,8 @@ jobs: name: Comment runs-on: ubuntu-latest if: ${{ github.event.workflow_run.event == 'pull_request' }} + permissions: + pull-requests: write steps: - name: Download artifact diff --git a/.github/workflows/deploy.yml b/.github/workflows/deploy.yml index 934968145..d3e7c61c6 100644 --- a/.github/workflows/deploy.yml +++ b/.github/workflows/deploy.yml @@ -16,6 +16,7 @@ jobs: container: image: ghcr.io/texasinstruments/processor-sdk-doc:latest options: --entrypoint /bin/bash + permissions: {} steps: - name: Checkout diff --git a/.github/workflows/rstcheck.yml b/.github/workflows/rstcheck.yml index 2e88f5d07..24ba55477 100644 --- a/.github/workflows/rstcheck.yml +++ b/.github/workflows/rstcheck.yml @@ -18,6 +18,8 @@ jobs: container: image: ghcr.io/texasinstruments/processor-sdk-doc:latest options: --entrypoint /bin/bash + permissions: + contents: read steps: - name: Checkout repository diff --git a/.github/workflows/vale.yml b/.github/workflows/vale.yml index 62108b033..010109ac9 100644 --- a/.github/workflows/vale.yml +++ b/.github/workflows/vale.yml @@ -14,6 +14,8 @@ jobs: container: image: ghcr.io/staticrocket/processor-sdk-doc:latest options: --entrypoint /bin/bash + permissions: + contents: read steps: - name: Prepare GitHub workdir diff --git a/configs/AM335X/AM335X_linux_toc.txt b/configs/AM335X/AM335X_linux_toc.txt index 50aa51765..1dd6160ac 100644 --- a/configs/AM335X/AM335X_linux_toc.txt +++ b/configs/AM335X/AM335X_linux_toc.txt @@ -5,7 +5,7 @@ linux/Overview_Directory_Structure_Overview linux/Overview_Software_Stack linux/Overview_Technical_Support linux/Overview_Training -linux/Overview_GPLv3_Disclaimer +linux/Overview_GPLv3claimer linux/Overview/Processor_SDK_Linux_Getting_Started_Guide linux/Overview/Processor_SDK_Linux_create_SD_card linux/Overview/Download_and_Install_the_SDK diff --git a/source/linux/Foundational_Components/Graphics/Rogue/Overview.rst b/source/linux/Foundational_Components/Graphics/Rogue/Overview.rst index b38f35f05..ee905b19d 100644 --- a/source/linux/Foundational_Components/Graphics/Rogue/Overview.rst +++ b/source/linux/Foundational_Components/Graphics/Rogue/Overview.rst @@ -5,6 +5,8 @@ Introduction ############ +A gneral spelling mistake. + .. ifconfig:: CONFIG_gpu_ip in ('Rogue_8XE') |__PART_FAMILY_DEVICE_NAMES__| device is enabled with 3D graphics diff --git a/source/linux/Foundational_Components_ATF.rst b/source/linux/Foundational_Components_ATF.rst index df82766ac..2444c0442 100644 --- a/source/linux/Foundational_Components_ATF.rst +++ b/source/linux/Foundational_Components_ATF.rst @@ -8,7 +8,7 @@ Trusted Firmware-A (TF-A) provides a reference implementation of secure world software for Armv7-A and Armv8-A, including a Secure Monitor executing at Exception Level 3 (EL3). -Arm Trusted Firmware (ATF) is the initial code on ARMv8-A cores for all K3 platforms. +Arm Trusted Firmware (ATF) is the intial code on ARMv8-A cores for all K3 platforms. After setting up the initial core state and applying any needed errata fixes it sets up itself as the EL3 monitor handler. Following that, it installs the secure world open source Trusted Execution Environment (OP-TEE) software and passes execution