Home
last modified time | relevance | path

Searched refs:firmware (Results 1 – 25 of 136) sorted by relevance

123456

/rk3399_ARM-atf/docs/
H A Dchange-log.md6 ## [2.14.0](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/refs/tags/…
18 …55b519](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/c55b519ed8799…
26 …b9fc8c](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/bb9fc8c0bbf5f…
35 …ff7523](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/3ff7523883adb…
41 …5d0740](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/b5d0740e14f42…
51 …67e984](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/b67e984664a86…
61 …daebef](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/8daebefe59e51…
69 …515b43](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/8515b4395e62c…
70 …274b52](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/4274b5265576c…
71 …396aec](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/f396aec85ac52…
[all …]
/rk3399_ARM-atf/docs/threat_model/firmware_threat_model/
H A Dthreat_model_fw_update_and_recovery.rst7 This document provides a threat model of TF-A firmware for platforms with
8 the feature PSA firmware update or TBBR firmware update or both enabled.
9 To understand the design of the firmware update refer
21 is enabled. This includes the boot ROM (BL1), the trusted boot firmware (BL2).
45 | | | vulnerable/older firmware. |
64 1. The FWU metadata includes the firmware bank for booting; the attacker
65 tries to modify it to prevent the execution of the updated firmware.
66 2. The FWU metadata features a field indicating the firmware's status, either
68 ensuring the updated firmware consistently runs in trial mode, with the
94 | | | vulnerable/older firmware. |
H A Dthreat_model_rse_interface.rst16 the AP core. The threat model for the RSE firmware will be provided by the RSE
17 firmware project in the future.
48 allowed only for firmware running at EL3. Accidentally exposing this
/rk3399_ARM-atf/docs/getting_started/
H A Dimage-terminology.rst33 Clearly, many of these images are not BootLoaders, they are simply firmware
46 This is a packaging format used by TF-A to package firmware images in a single
48 platform-specific and may include TF-A images and other firmware images
57 and authenticate an updateable AP firmware image into an executable RAM
63 This is the 2nd stage AP firmware. It is currently also known as the "Trusted
65 required to load and authenticate all 3rd level firmware images into their
71 Also known as "SoC AP firmware" or "EL3 monitor firmware". Its primary purpose
107 This is the Realm-EL2 firmware. It is required if
117 and authenticate an updateable SCP firmware image into an executable RAM
119 conjunction with other processor firmware (for example, ``AP_BL1`` and
[all …]
/rk3399_ARM-atf/docs/plat/
H A Dsynquacer.rst18 `link <https://github.com/ARM-software/arm-trusted-firmware>`__
32 SCP firmware --> TF-A BL31 --> UEFI(edk2)
50 export WORKSPACE=$HOME/build/developerbox-firmware
58 git clone https://github.com/ARM-software/arm-trusted-firmware -b master
67 cd $WORKSPACE/arm-trusted-firmware
90 - The firmware image, which comprises the option ROM, ARM trusted firmware and
104 installed then you can adopt your the newly compiled system firmware using
H A Dqemu-sbsa.rst4 Trusted Firmware-A (TF-A) implements the EL3 firmware layer for QEMU SBSA
27 git clone https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git tfa
36 git clone https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git tfa
H A Dbrcm-stingray.rst7 Trusted Firmware-A (TF-A) is used to implement secure world firmware, supporting
21 `link <https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/>`__
H A Drpi5.rst24 The firmware will be generated at ``build/rpi5/debug/bl31.bin``.
29 kernel from the firmware.
46 Copy the firmware binary to the first FAT32 partition of a supported boot media
50 No other config options or files are required by the firmware alone, this will
H A Dti-k3.rst4 Trusted Firmware-A (TF-A) implements the EL3 firmware layer for Texas Instruments K3 SoCs.
24 https://github.com/ARM-software/arm-trusted-firmware.git
H A Dxilinx-versal-net.rst4 Trusted Firmware-A implements the EL3 firmware layer for Xilinx Versal NET.
51 firmware. Options:
99 | | Management APIs to firmware
/rk3399_ARM-atf/docs/design/
H A Dtrusted-board-boot.rst4 The `Trusted Board Boot` (TBB) feature prevents malicious firmware from running
5 on the platform by authenticating all firmware images up to and including the
23 - The set of firmware images in use on this platform.
24 Typically, most platforms share a common set of firmware images (BL1, BL2,
79 In the TBBR CoT, all firmware binaries and certificates are (directly or
88 The private part of this key is used to sign the trusted boot firmware
120 - **Trusted boot firmware certificate**
123 the BL2 image and hashes of various firmware configuration files
132 - **SCP firmware key certificate**
137 - **SCP firmware content certificate**
[all …]
H A Dindex.rst11 firmware-design
/rk3399_ARM-atf/docs/about/
H A Dfeatures.rst62 Firmware encryption and packaging of the various firmware images into a
65 - Measured boot support with PoC to showcase its interaction with firmware TPM
70 - Following firmware update mechanisms available:
85 interrupts to their registered handlers, to facilitate firmware-first
88 - A dynamic configuration framework that enables each of the firmware images
91 as part of the FIP, to be passed through the firmware stages.
92 This feature is now incorporated inside the firmware configuration framework
96 the EL3 Runtime Software is loaded using other firmware or a separate
100 - Support for Errata management firmware interface.
/rk3399_ARM-atf/plat/arm/board/morello/fdts/
H A Dmorello_nt_fw_config.dts28 * Placeholder for firmware-version node with default values.
32 firmware-version {
/rk3399_ARM-atf/docs/plat/arm/morello/
H A Dindex.rst5 The platform port present at `site <https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git>`_
18 firmware image (the FIP image) from the AP QSPI NOR Flash Memory into the
24 firmware. Execution is finally handed off to AP_BL33, which is the non-secure
/rk3399_ARM-atf/docs/plat/qti/
H A Dmsm8916.rst22 It provides a minimal, community-maintained EL3 firmware and PSCI implementation,
34 The TF-A port is much more minimal compared to the original firmware and
54 BL31 (AArch64) or BL32/SP_MIN (AArch32) replaces the original ``tz`` firmware
61 the normal world bootloader was already loaded into RAM by a previous firmware
97 reports. This must be the same UART as used by earlier boot firmware since
105 The memory region used for the different firmware components is not fixed and
107 used by the original firmware (see ``platform.mk``):
111 * ``BL31_BASE``: Base address for the BL31 firmware component. Must point to
114 * ``BL32_BASE``: Base address for the BL32 firmware component.
126 but it provides the firmware with required metadata.
[all …]
/rk3399_ARM-atf/
H A D.gitreview4 project=TF-A/trusted-firmware-a
/rk3399_ARM-atf/docs/security_advisories/
H A Dsecurity-advisory-tfv-2.rst58 .. _commit 495f3d3: https://github.com/ARM-software/arm-trusted-firmware/commit/495f3d3
59 .. _AArch64 macro: https://github.com/ARM-software/arm-trusted-firmware/blob/bcc2bf0/include/common…
60 .. _AArch32 equivalent: https://github.com/ARM-software/arm-trusted-firmware/blob/bcc2bf0/include/c…
61 .. _Pull Request #841: https://github.com/ARM-software/arm-trusted-firmware/pull/841
H A Dsecurity-advisory-tfv-5.rst54 .. _Pull Request #1127: https://github.com/ARM-software/arm-trusted-firmware/pull/1127
55 .. _Commit e290a8fcbc: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/?id=e290a…
56 .. _Commit c3e8b0be9b: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/?id=c3e8b…
H A Dsecurity-advisory-tfv-7.rst38 new firmware interfaces, for example the `Software Delegated Exception Interface
90 the default mitigation state for firmware-managed execution contexts is enabled.
107 …n vulnerabilities: https://developer.arm.com/cache-speculation-vulnerability-firmware-specification
108 .. _Pull Request #1392: https://github.com/ARM-software/arm-trusted-firmware/pull/1392
109 .. _Pull Request #1397: https://github.com/ARM-software/arm-trusted-firmware/pull/1397
/rk3399_ARM-atf/plat/arm/board/fvp/fdts/
H A Dfvp_fw_config.dts34 * Load SoC and TOS firmware configs at the base of
36 * overlap BL2, BL31 or BL32. The NT firmware config
/rk3399_ARM-atf/docs/components/
H A Dmpmm.rst11 |MPMM| is enabled on a per-core basis by the EL3 runtime firmware.
20 runtime firmware - please see :ref:`Activity Monitor Auxiliary Counters` for
H A Ddebugfs-design.rst10 The *DebugFS* feature is primarily aimed at exposing firmware debug data to
20 The implementation permits exposing virtual files, firmware drivers, and file blobs.
71 measurements through a file, and internal firmware state counters through
73 - This permits direct access to a firmware driver, mainly for test purposes
105 - Notice, a physical device driver if exposed by the firmware may conflict with
/rk3399_ARM-atf/docs/plat/arm/automotive_rd/
H A Drdaspen.rst20 Once loaded, the RSE signals the System Control Processor firmware (SCP-firmware)
23 The SCP-firmware then sets the reset vector base address (RVBAR) for the AP, ensuring
24 it starts executing BL2 from the designated address. Following this, the SCP-firmware
52 * (If present) Reads and loads the SPMC manifest (for S-EL2 firmware configuration)
/rk3399_ARM-atf/docs/plat/arm/corstone1000/
H A Dindex.rst14 The board boot relies on CoT (chain of trust). The trusted-firmware-a
23 BL2 performs the actions described in the trusted-firmware-a TBB design

123456