Home
last modified time | relevance | path

Searched refs:see (Results 1 – 25 of 47) sorted by relevance

12

/rk3399_ARM-atf/plat/arm/board/tc/fdts/
H A Dtc_spmc_common_sp_manifest.dtsi8 * Secure world memory map. For a full view of the DRAM map, see platform_def.h
/rk3399_ARM-atf/docs/perf/
H A Dtsp.rst9 must be recompiled as well. For more information on SPs and SPDs, see the
H A Dpsci-performance-n1sdp.rst12 Please see the Runtime Instrumentation :ref:`Testing Methodology
/rk3399_ARM-atf/docs/components/
H A Dmpmm.rst20 runtime firmware - please see :ref:`Activity Monitor Auxiliary Counters` for
H A Dsdei.rst126 ``OR``\ ed to form parameters to macros that define events (see
236 bound or dynamic events can't be explicitly dispatched (see the section below).
/rk3399_ARM-atf/docs/components/fconf/
H A Dfconf_properties.rst24 If secondary-load-address is also provided (see below), then this is the
/rk3399_ARM-atf/docs/getting_started/
H A Ddocs-build.rst53 directory of the project, run the following command to see the supported
98 other use cases, please see the official `Poetry`_ documentation.
/rk3399_ARM-atf/docs/security_advisories/
H A Dsecurity-advisory-tfv-10.rst113 child certificate (see ``auth_hash()``).
116 authenticity and integrity (see ``auth_signature()``).
119 it from unauthorized rollback to a previous version (see ``auth_nvctr()``).
H A Dsecurity-advisory-tfv-13.rst25 | | Also see mitigation guidance in the `Official Arm Advisory`_ |
H A Dsecurity-advisory-tfv-7.rst83 on exit from EL3. For more information on this approach, see `Firmware
/rk3399_ARM-atf/docs/about/
H A Dcontact.rst25 You can see a `summary of all the lists`_ on the TrustedFirmware.org website.
H A Dfeatures.rst5 description of these features and their implementation details, please see
H A Dlts.rst115 taking into account the test-and-debug phase before LTS is cut (see below) --
140 members, see the project charter for more details). This automated test coverage
399 adapt it as we see practical problems.
/rk3399_ARM-atf/tools/nxp/create_pbl/
H A DREADME40 -c SoC Number (see description above)
/rk3399_ARM-atf/docs/threat_model/firmware_threat_model/
H A Dindex.rst9 which focuses on the most common configuration we expect to see. The other
/rk3399_ARM-atf/docs/plat/qti/
H A Dmsm8916.rst71 CPUs that only support AArch32 (see table above). For all others AArch64 is the
99 the usual debug UART used for the platform (see ``platform.mk``).
107 used by the original firmware (see ``platform.mk``):
/rk3399_ARM-atf/docs/plat/
H A Drz-g2.rst71 reference tree [1] resets into EL1 before entering BL2 - see its
83 PARAMS_BASE instead of using registers to get to those locations (see
H A Drcar-gen3.rst71 reference tree [1] resets into EL1 before entering BL2 - see its
88 PARAMS_BASE instead of using registers to get to those locations (see
H A Drpi4.rst48 see some text from BL31, followed by the output of the EL2 payload.
H A Drpi3.rst136 instructions to see how to do it. This system is strongly discouraged.
432 to it (for example, with ``screen /dev/ttyUSB0 115200``) you should see some
433 text. In the case of an AArch32 kernel, you should see something like this:
/rk3399_ARM-atf/docs/plat/marvell/armada/
H A Duart-booting.rst40 After that immediately start terminal on ``/dev/ttyUSB<port#>`` to see boot output.
/rk3399_ARM-atf/docs/design_documents/
H A Dmeasured_boot_poc.rst408 Following up with the fTPM startup process, we can see that all the
437 (see the field ``AlgorithmId`` on the logs above):
468 because the boot process records all the images in this PCR (see field ``PCRIndex``
486 the build environment variable ``FTPM_FLAGS`` (see ``<toolkit_home>/build/common.mk``)
/rk3399_ARM-atf/docs/design/
H A Dinterrupt-framework-design.rst86 types are supported for GIC version 2.0 (Arm GICv2) (see `Assumptions in
300 This section describes in detail the role of each software component (see
518 (see `Valid routing models`_) effects the implementation of the Secure-EL1
614 This section describes in detail the role of each software component (see
779 (see section `Test secure payload dispatcher behavior`_).
808 the secure CPU context (see step 3 above) in case the TSP had been preempted
837 option ``TSP_NS_INTR_ASYNC_PREEMPT`` (see Section `Test secure payload
878 (see section `Implication of preempted SMC on Non-Secure Software`_). The TSPD
966 identifier from the non-secure state (see section `Test secure payload
/rk3399_ARM-atf/make_helpers/
H A Dconstraints.mk197 $(error Error: PAUTH_LR cannot be used without PAUTH (see BRANCH_PROTECTION))
/rk3399_ARM-atf/docs/process/
H A Dcommit-style.rst91 can, or add their own if no appropriate one exists (see :ref:`Adding Scopes`).

12