Home
last modified time | relevance | path

Searched full:os (Results 1 – 25 of 148) sorted by relevance

123456

/rk3399_ARM-atf/docs/design_documents/
H A Dpsci_osi_mode.rst1 PSCI OS-initiated mode
31 OS-initiated.
43 OS-initiated
46 OS-initiated mode is optional.
48 In OS-initiated mode, the calling OS is responsible for coordinating power
55 There are two reasons why OS-initiated mode might be a more suitable option than
65 In OS-initiated mode, the OS has knowledge of the next wakeup event for each
75 In platform-coordinated mode, the OS doesn't have visibility when the last core
76 at a power level enters a low-power state. If the OS wants to perform last man
80 platform-coordinated mode when it should be using OS-initiated mode instead.
[all …]
/rk3399_ARM-atf/docs/components/spd/
H A Doptee-dispatcher.rst4 `OP-TEE OS`_ is a Trusted OS running as Secure EL1.
9 There are two different modes for loading the OP-TEE OS. The default mode will
11 platforms to use. There is also another technique that will load OP-TEE OS after
15 understand the risks involved with allowing the Trusted OS to be loaded this
30 .. _OP-TEE OS: https://github.com/OP-TEE/build
/rk3399_ARM-atf/tools/cot_dt2c/tests/
H A Dtest_util.py7 import os
14 return os.path.dirname(os.path.realpath(sys.argv[0]))
28 os.remove(test_output)
/rk3399_ARM-atf/services/spd/trusty/
H A Dsmcall.h38 #define SMC_ENTITY_TRUSTED_OS 50U /* Trusted OS calls */
40 #define SMC_ENTITY_SECURE_MONITOR 60U /* Trusted OS calls internal to secure monitor */
47 * Return from secure os to non-secure os with return value in r1
66 /* Trusted OS entity calls */
76 * Standard Trusted OS Function IDs that fall under Trusted OS call range
H A Dgeneric-arm64-smcall.c51 printf("secure os: "); in trusty_dputc()
53 printf("non-secure os: "); in trusty_dputc()
/rk3399_ARM-atf/tools/cert_create/src/dualroot/
H A Dcot.c113 .help_msg = "Trusted OS Firmware Key Certificate (output file)",
114 .cn = "Trusted OS Firmware Key Certificate",
127 .help_msg = "Trusted OS Firmware Content Certificate (output file)",
128 .cn = "Trusted OS Firmware Content Certificate",
330 .ln = "Trusted OS Firmware content certificate public key",
339 .help_msg = "Trusted OS image file",
341 .ln = "Trusted OS hash (SHA256)",
349 .help_msg = "Trusted OS Extra1 image file",
351 .ln = "Trusted OS Extra1 hash (SHA256)",
360 .help_msg = "Trusted OS Extra2 image file",
[all …]
/rk3399_ARM-atf/include/bl32/payloads/
H A Dtlk.h14 * Generate function IDs for the Trusted OS/Apps
20 * Trusted OS specific function IDs
65 * Standard Trusted OS Function IDs that fall under Trusted OS call range
70 #define TOS_CALL_VERSION 0xbf00ff03 /* Trusted OS Call Version */
/rk3399_ARM-atf/tools/sptool/
H A Dsptool.py22 import os
44 if not os.path.isfile(pm_path) or not os.path.isfile(img_path):
85 return os.path.getsize(self.pm_path)
89 return os.path.getsize(self.img_path)
130 if not os.path.exists(os.path.dirname(args.o)):
H A Dsp_mk_generator.py54 import os
75 if "out_dir" not in args.keys() or not os.path.isdir(args["out_dir"]):
79 if "sp_layout_dir" not in args.keys() or not os.path.isdir(args["sp_layout_dir"]):
89 return os.path.join(args["sp_layout_dir"], get_file_from_layout(sp_node["pm"]))
93 return os.path.join(args["sp_layout_dir"], get_file_from_layout(sp_node["image"]))
110 return os.path.join(args["out_dir"], f"{sp}.pkg")
197 sp_hob_name = os.path.basename(sp + ".hob.bin")
198 sp_hob_name = os.path.join(args["out_dir"], f"{sp_hob_name}")
244 sp_dtb_name = os.path.basename(get_file_from_layout(sp_layout[sp]["pm"]))[:-1] + "b"
245 sp_dtb = os.path.join(args["out_dir"], f"fdts/{sp_dtb_name}")
[all …]
/rk3399_ARM-atf/tools/cert_create/src/tbbr/
H A Dtbb_ext.c146 .ln = "Trusted OS Firmware content certificate public key",
154 .help_msg = "Trusted OS image file",
156 .ln = "Trusted OS hash (SHA256)",
163 .help_msg = "Trusted OS Extra1 image file",
165 .ln = "Trusted OS Extra1 hash (SHA256)",
173 .help_msg = "Trusted OS Extra2 image file",
175 .ln = "Trusted OS Extra2 hash (SHA256)",
183 .help_msg = "Trusted OS Firmware Config file",
185 .ln = "Trusted OS Firmware Config hash",
210 .help_msg = "Non Trusted OS Firmware Config file",
[all …]
H A Dtbb_cert.c111 .help_msg = "Trusted OS Firmware Key Certificate (output file)",
113 .cn = "Trusted OS Firmware Key Certificate",
125 .help_msg = "Trusted OS Firmware Content Certificate (output file)",
127 .cn = "Trusted OS Firmware Content Certificate",
H A Dtbb_key.c48 .help_msg = "Trusted OS Firmware Content Certificate key file or PKCS11 URI",
49 .desc = "Trusted OS Firmware Content Certificate key"
/rk3399_ARM-atf/docs/about/
H A Dfeatures.rst35 for example an AArch32 Secure OS.
57 - SPDs for the `OP-TEE Secure OS`_, `NVIDIA Trusted Little Kernel`_,
58 `Trusty Secure OS`_ and `ProvenCore Secure OS`_.
148 .. _OP-TEE Secure OS: https://github.com/OP-TEE/optee_os
150 .. _Trusty Secure OS: https://source.android.com/security/trusty
151 .. _ProvenCore Secure OS: https://provenrun.com/products/provencore/
/rk3399_ARM-atf/tools/fiptool/
H A Dtbbr_config.c51 .name = "Secure Payload BL32 (Trusted OS)",
56 .name = "Secure Payload BL32 Extra1 (Trusted OS Extra1)",
61 .name = "Secure Payload BL32 Extra2 (Trusted OS Extra2)",
128 .name = "Trusted OS Firmware key certificate",
155 .name = "Trusted OS Firmware content certificate",
/rk3399_ARM-atf/plat/mediatek/build_helpers/
H A Dconditional_eval_options.mk35 # TEE OS config
40 # MICROTRUST OS config
/rk3399_ARM-atf/docs/components/fconf/
H A Dtb_fw_bindings.rst28 - Secure Payload BL32 (Trusted OS) UUID
32 - Secure Payload BL32_EXTRA1 (Trusted OS Extra1) UUID
36 - Secure Payload BL32_EXTRA2 (Trusted OS Extra2) UUID
52 - Trusted OS Firmware Configuration TOS_FW_CONFIG UUID
/rk3399_ARM-atf/docs/plat/
H A Dnvidia-tegra.rst74 Trusted OS dispatcher
77 Tegra supports multiple Trusted OS'.
84 This allows other Trusted OS vendors to use the upstream code and include
87 These are the supported Trusted OS' by Tegra platforms.
121 size for loading the Trusted OS and the UART port ID to be used. The Tegra
H A Dallwinner.rst73 entirely. Any bootloader or OS would need to setup the PMIC on its own then.
137 Trusted OS dispatcher
140 One can boot Trusted OS(OP-TEE OS, bl32 image) along side bl31 image on Allwinner A64.
143 while compiling the bl31 image and make sure the loader (SPL) loads the Trusted OS binary to
/rk3399_ARM-atf/include/export/common/tbbr/
H A Dtbbr_img_def_exp.h26 /* Secure Payload BL32 (Trusted OS) */
61 /* Secure Payload BL32_EXTRA1 (Trusted OS Extra1) */
64 /* Secure Payload BL32_EXTRA2 (Trusted OS Extra2) */
/rk3399_ARM-atf/include/bl32/tsp/
H A Dtsp.h80 * Standard Trusted OS Function IDs that fall under Trusted OS call range
86 #define TOS_CALL_VERSION 0xbf00ff03 /* Trusted OS Call Version */
/rk3399_ARM-atf/tools/memory/src/memory/
H A Dsummary.py8 import os
12 from os.path import (
96 obj_split = os.sep + basename(object_name)
272 mbed-os
276 mbed-os/test.o
277 mbed-os/drivers
285 split_name = module_name.split(os.sep)
296 split_name = module_name.split(os.sep)
370 parts = module_name.split(os.sep)
383 parts = module_name.split(os.sep)
/rk3399_ARM-atf/docs/components/
H A Del3-spmc.rst239 The request made by an Hypervisor or OS kernel is forwarded to the SPMC and
253 When invoked from the Hypervisor or OS kernel, the buffers are mapped into the
258 caller, either it being the Hypervisor or OS kernel, as well as a secure
267 - from Hypervisor or OS kernel to SPMC. The request is relayed by the SPMD.
285 (or OS Kernel if Hyp is absent), SPMD and SPMC.
325 - An SP cannot send a direct request to an Hypervisor or OS kernel.
326 - An Hypervisor or OS kernel can send a direct request to an SP or LSP.
327 - An SP and LSP can send a direct response to an Hypervisor or OS kernel.
343 The Hypervisor or OS kernel can issue the FFA_SPM_ID_GET call handled by the
409 - The Hypervisor or OS kernel is the component initiating PSCI service calls.
[all …]
/rk3399_ARM-atf/tools/cert_create/src/cca/
H A Dcot.c259 .help_msg = "Trusted OS image file",
261 .ln = "Trusted OS hash (SHA256)",
269 .help_msg = "Trusted OS Firmware Config file",
271 .ln = "Trusted OS Firmware Config hash",
401 .help_msg = "Non Trusted OS Firmware Config file",
403 .ln = "Non-Trusted OS Firmware Config hash",
/rk3399_ARM-atf/lib/romlib/
H A Dromlib_generator.py12 import os
38 parent = os.path.normpath(parent)
50 file_name = os.path.normpath(file_name)
71 included_file = os.path.normpath(line_elements[1])
89 TEMPLATE_DIR = os.path.dirname(os.path.realpath(__file__)) + "/templates/"
/rk3399_ARM-atf/plat/arm/board/fvp/aarch64/
H A Dfvp_lsp_ras_sp.c37 * it with normal world firmware and/or OS kernel through a reserved
40 * TF-A to notify the OS kernel.
41 * Step 6: Consequently, TF-A dispatches an SDEI event to notify the OS kernel

123456