| /rk3399_ARM-atf/docs/components/spd/ |
| H A D | optee-dispatcher.rst | 4 `OP-TEE OS`_ is a Trusted OS running as Secure EL1. 9 There are two different modes for loading the OP-TEE OS. The default mode will 11 platforms to use. There is also another technique that will load OP-TEE OS after 15 understand the risks involved with allowing the Trusted OS to be loaded this 30 .. _OP-TEE OS: https://github.com/OP-TEE/build
|
| H A D | pnc-dispatcher.rst | 7 ProvenCore is a secure OS developed by ProvenRun S.A.S. using deductive formal methods.
|
| H A D | tlk-dispatcher.rst | 20 TLK is a Trusted OS running as Secure EL1. It is a Free Open Source Software
|
| /rk3399_ARM-atf/docs/design_documents/ |
| H A D | psci_osi_mode.rst | 1 PSCI OS-initiated mode 31 OS-initiated. 43 OS-initiated 46 OS-initiated mode is optional. 48 In OS-initiated mode, the calling OS is responsible for coordinating power 55 There are two reasons why OS-initiated mode might be a more suitable option than 65 In OS-initiated mode, the OS has knowledge of the next wakeup event for each 75 In platform-coordinated mode, the OS doesn't have visibility when the last core 76 at a power level enters a low-power state. If the OS wants to perform last man 80 platform-coordinated mode when it should be using OS-initiated mode instead. [all …]
|
| /rk3399_ARM-atf/docs/about/ |
| H A D | features.rst | 35 for example an AArch32 Secure OS. 57 - SPDs for the `OP-TEE Secure OS`_, `NVIDIA Trusted Little Kernel`_, 58 `Trusty Secure OS`_ and `ProvenCore Secure OS`_. 148 .. _OP-TEE Secure OS: https://github.com/OP-TEE/optee_os 150 .. _Trusty Secure OS: https://source.android.com/security/trusty 151 .. _ProvenCore Secure OS: https://provenrun.com/products/provencore/
|
| /rk3399_ARM-atf/make_helpers/ |
| H A D | common.mk | 18 .exe := $(if $(filter Windows_NT,$(OS)),.exe)
|
| /rk3399_ARM-atf/docs/components/fconf/ |
| H A D | tb_fw_bindings.rst | 28 - Secure Payload BL32 (Trusted OS) UUID 32 - Secure Payload BL32_EXTRA1 (Trusted OS Extra1) UUID 36 - Secure Payload BL32_EXTRA2 (Trusted OS Extra2) UUID 52 - Trusted OS Firmware Configuration TOS_FW_CONFIG UUID
|
| /rk3399_ARM-atf/docs/plat/ |
| H A D | allwinner.rst | 73 entirely. Any bootloader or OS would need to setup the PMIC on its own then. 137 Trusted OS dispatcher 140 One can boot Trusted OS(OP-TEE OS, bl32 image) along side bl31 image on Allwinner A64. 143 while compiling the bl31 image and make sure the loader (SPL) loads the Trusted OS binary to
|
| H A D | npcm845x.rst | 10 u-boot, OPTEE-OS, trusted-firmware-a and Linux.
|
| H A D | nvidia-tegra.rst | 74 Trusted OS dispatcher 77 Tegra supports multiple Trusted OS'. 84 This allows other Trusted OS vendors to use the upstream code and include 87 These are the supported Trusted OS' by Tegra platforms. 121 size for loading the Trusted OS and the UART port ID to be used. The Tegra
|
| H A D | rpi5.rst | 54 partition. This has been validated with a copy of Raspberry Pi OS.
|
| /rk3399_ARM-atf/lib/zlib/ |
| H A D | inflate.h | 24 OS, /* i: waiting for extra flags and operating system (gzip) */ enumerator
|
| /rk3399_ARM-atf/docs/security_advisories/ |
| H A D | security-advisory-tfv-12.rst | 17 | Affected | environments where a modified, untrusted guest OS may | 20 | Impact | Potential for a compromised guest OS to attack the host via |
|
| H A D | security-advisory-tfv-6.rst | 58 Note that if other privileged software, for example a Rich OS kernel, implements 118 integrated, for example as part of a Trusted OS. Therefore any Variant 2 133 applicable for TF. However, Secure Payloads (for example, Trusted OS) should
|
| /rk3399_ARM-atf/docs/components/ |
| H A D | el3-spmc.rst | 239 The request made by an Hypervisor or OS kernel is forwarded to the SPMC and 253 When invoked from the Hypervisor or OS kernel, the buffers are mapped into the 258 caller, either it being the Hypervisor or OS kernel, as well as a secure 267 - from Hypervisor or OS kernel to SPMC. The request is relayed by the SPMD. 285 (or OS Kernel if Hyp is absent), SPMD and SPMC. 325 - An SP cannot send a direct request to an Hypervisor or OS kernel. 326 - An Hypervisor or OS kernel can send a direct request to an SP or LSP. 327 - An SP and LSP can send a direct response to an Hypervisor or OS kernel. 343 The Hypervisor or OS kernel can issue the FFA_SPM_ID_GET call handled by the 409 - The Hypervisor or OS kernel is the component initiating PSCI service calls. [all …]
|
| /rk3399_ARM-atf/plat/arm/board/fvp/fdts/ |
| H A D | fvp_fw_config.dts | 45 /* If required, SPD should enable loading of trusted OS fw config */
|
| /rk3399_ARM-atf/tools/cot_dt2c/ |
| H A D | pyproject.toml | 19 "Operating System :: OS Independent",
|
| /rk3399_ARM-atf/docs/plat/arm/automotive_rd/ |
| H A D | rdaspen.rst | 66 * Initializes Trusted OS (OP-TEE) environment 99 The ``BL32`` flag is optional and should be set only if a Trusted OS is required.
|
| /rk3399_ARM-atf/docs/getting_started/ |
| H A D | rt-svc-writers-guide.rst | 22 Arm to support `PSCI`_, Secure Monitor for a Trusted OS and SoC specific 42 reserved exclusively for Trusted OS providers or for interoperability with 58 Fast 50-63 Trusted OS calls 61 Yielding 2-63 Trusted OS Standard Calls 308 Services that handle SMC Functions targeting a Trusted OS, Trusted Application,
|
| H A D | image-terminology.rst | 77 Typically this is a TEE or Trusted OS, providing runtime secure services to the 88 For example, UEFI or uboot. Its primary purpose is to boot a normal world OS.
|
| H A D | initial-build.rst | 76 include other runtime services, for example Trusted OS services. A guide
|
| /rk3399_ARM-atf/docs/ |
| H A D | license.rst | 122 - Some source files originating from the `mbed OS`_ project. 138 .. _mbed OS: https://github.com/ARMmbed/mbed-os/
|
| H A D | glossary.rst | 262 Trusted Little Kernel. A Trusted OS from NVIDIA.
|
| /rk3399_ARM-atf/fdts/ |
| H A D | rdaspen.dts | 138 /* OS storage */
|
| /rk3399_ARM-atf/docs/plat/marvell/armada/ |
| H A D | build.rst | 98 by Trusted OS (OP-TEE OS, BL32). The TF-A only prepares CCU address translation windows 100 When Trusted OS activates LLC SRAM, the CCU window target is changed to SRAM. 101 There is no reason to enable this feature if OP-TEE OS built with CFG_WITH_PAGER=n. 102 Only set LLC_SRAM=1 if OP-TEE OS is built with CFG_WITH_PAGER=y.
|